I need a powerpoint presentation on the mentioned topic. The presentation must have:
a) Should include a summary of a product/research information
b) Should include a background information (historical development, other
technologies associated with it, original developers/inventors etc.)
c) Identify (potential) market and competitors (or similar research groups)
d) Describe step-by-step development (or operation) process
e) Provide current status and any future plan
f) Your critics (e.g., usability, functionality, or robustness) about this product/research
g) Must include reference (if possible, add a video link showing a demo)
COMPETENCIES
4058.1.1 : Security Architecture and Engineering Requirements
The graduate designs technical specifications based on an organizations security requirements.
4058.1.2 : Threat Identification
The graduate identifies threats and vulnerabilities applicable to business systems and assets.
INTRODUCTION
As technology companies continue to move business services to the cloud, many companies are finding a need to upgrade the technological infrastructure. When implementing new architecture, IT companies will consult with IT security firms to identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.
For this task, you will use the attached Healthy Body Wellness Center Case Study, Healthy Body Wellness Center Security Assessment Report, and the Business Requirements Document Template to analyze, assess, and prioritize existing threats to the current architecture and design technica
Answer the following questions in a cohesive and comprehensive essay.
What is the difference between a Local Temporary Table and Global Temporary Table?
What is database normalization?
What are the differences between DDL, DML and DCL in SQL?
What is a transaction? What are ACID properties?
What are indexes?
Requirements:
A minimum of 350 words.
Use APA format.
Times New Roman 12 pt font, double spaced with 1" margins.
Please note that an abstract, title page and reference page are not required.
Find an IT organisation, case study, of your choice. For the organisation write 2-3 paragraphs for each of the following:
What is GDPR and how it is implemented in EU?
How does the organisation implement the GDPR?
What security measures does the organisation employ to safeguard personal data?
How does the organisation address the issue of equality in terms of its IT/computers?
How does the organisation address the issue of intellectual property rights (copyrights, patents and trademarks)?
IT organisation can be any for example Cisco, amazon, etc.
Concerning Usable Data, please answer the following questions and use at least 2 scholarly references:
1. How does data become usable information?
2. How can it be misused?
3. Find articles to support your argument in both situations.
4. Is the article based on quantitative or qualitative research? Explain.
5. What are the differences between primary and secondary sources?
6. Provide examples of primary and/or secondary sources you will use in your paper (this is referring to the previous order, please let me know if you need a copy).
The final part of the project will compile all components into a comprehensive proposal. Each section should include all noted requirements in previous units. Comprehensively, the final requirements are as follows:
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Resources and citations are formatted according to current APA style and formatting. Include a table of contents, reference page, appendices (if applicable), and so on.
Number of resources: Minimum of 912 resources.
Length of paper: 918 typed double-spaced pages.
Font and font size: Arial, 10 point.
Your final paper should follow this outline:
Executive Memo/Cover Letter.
Statement of Need.
Project Overview.
Definition.
Type of Organization.
Scope.
Goals.
Implementation.
Plan.
Schedule.
Milestone.
Risks and Assumptions.
References.
Appendices.
Consider that your executive management team i
The purpose of Phase 3 of the project is to identify risks and assumptions based on your chosen data storage and management solution. Risks and assumptions are defined as any negative or adverse consequences that may impact project success. The risks should directly relate to specific strategies for evaluating metadata design and management. This section should include risk and assumption descriptions, as well as mitigating actions.
Research and write a short (36 pages for the body section) paper in current APA style and format, with a minimum of three references, that covers the following topics:
Risks.
Identify and discuss risks of implementing the chosen data storage solution. Focus on minimizing threats to achieve business goals.
Apply specific strategy for evaluating metadata design and management, in relation to noted risks.
Discuss factors that may impact project failure. Examples:
User needs; metadata management.
Thorough investigation of technology
The purpose of Phase 2 of the project is to develop a plan, a schedule, and milestones for the implementation of the data storage solution.
Research and write a short (36 pages for the body section) paper in current APA style and formatting, with a minimum of three references, that covers the following topics:
Plan: This section should discuss the approach for implementing the data storage solution. You can either use a case study or an actual organization for which the solution will be implemented.
Specifically examine how the solution will impact effective data architecture to support data management activities.
Analyze how key advantages of the solution will impact data management to improve organizational effectiveness.
Explain the role that metadata management and design play in support of data management and your solution.
Address environmental factorsinternal and externalthat may impact the implementation.
Schedule: Establish a baseline schedule for
The purpose of Phase 1 of the project is to select a data storage solution that is effective in supporting the data management activities within a specific organization.
Research and write a short (36 pages for the body section) paper in current APA style and format, with a minimum of three references, that covers the following topics:
Project Definition.
Identify a data storage solution that contributes to effective data architecture able to support data management activities.
Provide a description of the data storage solution and describe how it relates to creating an effective data architecture that supports data management.
Discuss how the data storage solution may contribute to a specific business process (or processes), workflow, and organizational effectiveness.
Type of Organization.
Define a specific organization or type of organization for which the data storage solution will or can be implemented.
Explain how this particular data storage soluti
Write a 400 word, APA formatted paper with a minimum of 2 sources (of which 1 is a peer reviewed journal article).
Explain and analyze the RESPOND Function of the NIST CSF. How would this be applied in a business setting while implementing the NIST CSF?